WORKFORCE CYBER
INTELLIGENCE AND SECURITY
BLOG
A Human-centric Approach to Operational Awareness and Risk Management.

THE LATEST ON WORKFORCE CYBER INTELLIGENCE

$16.2M: The High Cost of Insider "Risks"
Last week DTEX released the 2023 Cost of Insider Risks Global Report, independently conducted by Ponemon Institute. The…
Read More
Pentagon Compromise | The Most Effective Insider Threat Sensors Are People
DTEX i3 team confirms people are the most effective insider threat sensors; identifies several other early warning indicators. It’s been four…
Read More
Pseudonymization vs. Anonymization
A common challenge organizations face is striking the balance between employee privacy and insider risk monitoring. Using pseudonymization, organizations can…
Read More
Pentagon Compromise | The Most Effective Insider Threat Sensors Are People
DTEX i3 team confirms people are the most effective insider threat sensors; identifies several other early warning indicators. It’s been four…
Read More
CyberBytes Recap: The Insider Threat and the Real Risk to Enterprises
I recently sat down with CyberBytes podcast host and co-founder of Aspiron Search Joseph Cooper to discuss the insider…
Read More
Insider Risk Legislation is Coming: Are You Prepared?
The rise of foreign interference and high-profile breaches has highlighted the need to address the human element in cybersecurity through…
Read More
Massive Tech Layoffs Continue to Increase Insider Risks for Enterprises
The looming recession is driving big tech companies to reduce their workforce in 2023, with Microsoft being the latest to…
Read More
The Gig is Up! And that's Not All Good
This is the time of year when everyone is looking for little extra cash to pay off a few holiday…
Read More
Insider Threats in an Unstable Economy: DTEX i3 Team Data
This year has been a turbulent one for employers and employees alike. We rang in 2022 amid The Great Resignation—a…
Read More
Moving from Insider Risk to Insider Threat: Disgruntled Employees and Looming Layoffs
There’s been a lot of misconception about the quiet quitting movement since Zaid Khan, a 24-year-old engineer from New York, …
Read More
Protect Your Data: Cyber Security Tips for Online Shopping This Mother’s Day
In this blog, we frequently focus on how organizations can protect against malicious insider threats. However, we haven’t forgotten about…
Read More
3 Ways to Take Control of Your Cyber Security Career in 2022
As the cyber security landscape continues to transform before our eyes, it’s becoming increasingly evident that we can no longer…
Read More
DTEX i3 Team Q&A: The Super Malicious Insider
Earlier this year we published an in-depth report on the insider risk landscape for 2022, with research from the…
Read More
World Backup Day: How Insider Threats Intersect with Data Backup and Best Practices for Insider Risk Management
World Backup Day is a great time to review the basics of backing up data, and looking ahead to…
Read More